ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Based on Claim Verification Handling Flood Attacks in Disruption Tolerant Network

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 6)

Publication Date:

Authors : ;

Page : 40-45

Keywords : Disruption-Tolerant Networks (DTNs); Flooding attack; Hash based Message Authentication Code algorithm (HMAC); Rate limit certificate.;

Source : Downloadexternal Find it from : Google Scholarexternal


Disruption-Tolerant Networks (DTNs) deliver data to the collection of intermittently connected nodes. In traditional networks, malicious nodes within a DTN may try to attempt a data destruction or delay in transmit the data to its destination. In this paper, the flooding attack is focused and provides possible solutions for secure communication. . A rate limit certificate process is presented to check for authenticated user. Claim carry and check technique is used to overcome the difficulties in existing to count all the packets or replicas sent by a node due to the lack of communication infrastructure. Using Rate limit certificate only the flood attacker who exceeds the rate limit was identified. To overcome this proposed approach uses key. Key will be generated for the node who wishes to send packets less than the rate limit. The key Generation based on Hash based Message Authentication Code (HMAC) algorithm..Based on keys, attackers who sends packet within the rate limit can also Be easily identified

Last modified: 2014-06-19 16:42:18